Companies Home Search Profile

SC-400 Course Microsoft Information Protection Administrator

Focused View

John Christopher

9:38:12

3 View
  • 001 Welcome to the SC-400 Course!.mp4
    04:51
  • 002 Understanding the Microsoft Environment.mp4
    01:51
  • 003 A Solid Foundation of Active Directory Domains.mp4
    12:12
  • 004 A Solid Foundation of RAS, DMZ, and Virtualization.mp4
    13:09
  • 005 A Solid Foundation of the Microsoft Cloud Services.mp4
    17:15
  • 006 Missing-from-Udemy-for-Business.txt
  • 006 Udemy for Business Students.mp4
    01:47
  • 007 DO NOT SKIP Azure AD is being renamed.mp4
    03:28
  • 008 Creating a trial Microsoft 365Azure Account.mp4
    10:54
  • 009 Managing Microsoft 365 Services with Powershell.mp4
    15:55
  • 010 Connecting to Security and Compliance using PowerShell.mp4
    03:22
  • 011 IMPORTANT Using Assignments in the course.mp4
    04:08
  • 012 Questions for John Christopher.mp4
    05:43
  • 013 Order of concepts covered in the course.mp4
    01:29
  • 001 UPDATE Microsoft Compliance center is now Purview.mp4
    01:15
  • 002 Selecting a Sensitive Information Type based on an Organizations Requirements.mp4
    03:55
  • 003 Creating and Managing Custom Sensitive Information Types.mp4
    08:30
  • 004 Creating Custom Sensitive Information Types with exact data match.mp4
    02:49
  • 005 Document-Fingerprinting-Microsoft-365-Compliance-Microsoft-Docs.pdf
  • 005 Understanding Document Fingerprinting.mp4
    05:10
  • 006 Creating a Keyword Dictionary.mp4
    02:50
  • 001 Understanding Trainable Classifiers.mp4
    06:01
  • 002 Getting Started with Trainable Classifiers.mp4
    03:15
  • 002 Get-started-with-trainable-classifiers-Microsoft-365-Compliance-Microsoft-Docs.pdf
  • 001 Understanding Sensitivity Labels.mp4
    08:24
  • 002 Identifying Roles and Permissions for Administering Sensitivity Labels.mp4
    07:22
  • 003 Enabling Audit Logging before working with Sensitivity Labels.mp4
    01:32
  • 004 Creating Sensitivity Labels including with Email, Content Marking and Encryption.mp4
    10:04
  • 005 Configuring and Managing Sensitivity Label Policies.mp4
    05:19
  • 005 Learn-about-sensitivity-labels-Microsoft-365-Compliance-Microsoft-Docs.pdf
  • 006 Applying Sensitivity Labels to Teams, Microsoft 365 groups, and SharePoint.mp4
    18:43
  • 007 Configuring & Publishing Automatic Labeling Policies (excluding MCAS scenarios).mp4
    05:02
  • 008 Viewing Sensitivity Labels as an end user.mp4
    03:25
  • 009 Monitoring Data Classification and Label usage by using Label Analytics Tools.mp4
    04:56
  • 001 Design an email encryption solution based on methods available in Microsoft 365.mp4
    07:40
  • 002 Implement Microsoft Purview Message Encryption.mp4
    07:24
  • 003 Implement Microsoft Purview Advanced Message Encryption.mp4
    04:30
  • 001 Understanding the purpose of Data Loss Prevention.mp4
    06:27
  • 002 Recommending a Data Loss Prevention Solution for an Organization.mp4
    06:52
  • 003 Configuring Data Loss Prevention for Policy Precedence.mp4
    03:52
  • 004 Configuring policies for Exchange, SharePoint, OneDrive and Teams.mp4
    21:16
  • 005 Configuring the custom advanced settings in Data Loss Prevention policies.mp4
    11:54
  • 006 Editing the default Office 365 Data Loss Prevention Policy.mp4
    02:20
  • 007 Understanding Microsoft Cloud App Security (MCAS).mp4
    08:55
  • 008 Configuring policies in Microsoft Cloud App Security (MCAS).mp4
    12:09
  • 009 Create-test-and-tune-a-DLP-policy-Microsoft-365-Compliance-Microsoft-Docs.pdf
  • 009 Implementing Data Loss Prevention Policies in Test Mode.mp4
    04:58
  • 001 Setting up proper licensing for Microsoft Endpoint Data Loss Prevention.mp4
    05:22
  • 002 Configuring Policies for Endpoints.mp4
    04:22
  • 003 Configuring Endpoint Data Loss Prevention Settings.mp4
    07:06
  • 003 Get-started-with-Microsoft-365-Endpoint-data-loss-prevention-Microsoft-365-Compliance-Microsoft-Docs.pdf
  • 004 Recommending Configurations that enable devices for Endpoint DLP.mp4
    06:31
  • 005 Monitoring Endpoint Activities and Reports for Policy Violations.mp4
    02:05
  • 001 UPDATE Retention has moved.mp4
    01:09
  • 002 Creating and Applying Retention Labels.mp4
    09:27
  • 003 Creating and Applying Retention Label Policies.mp4
    03:20
  • 004 Configuring and Publishing Auto-Apply Label Policies.mp4
    04:34
  • 005 Learn-about-retention-policies-labels-to-automatically-retain-or-delete-content-Microsoft-365-Compliance-Microsoft-Docs.pdf
  • 005 Understanding Conflicting Retention Policies.mp4
    02:10
  • 001 Creating and Applying Retention Policies in Microsoft SharePoint and OneDrive.mp4
    05:56
  • 002 Creating and Applying Retention Policies in Microsoft Teams.mp4
    05:33
  • 003 Recovering Content in Microsoft Teams, SharePoint, and OneDrive.mp4
    03:22
  • 004 Recovering Content in Microsoft Exchange.mp4
    04:14
  • 005 Implementing Retention Policies and Tags in Microsoft Exchange Classic.mp4
    05:27
  • 006 Implementing a Retention Policy for Exchange in the Compliance Center.mp4
    02:15
  • 007 Assigning Exchange Retention Policies in Outlook.mp4
    01:13
  • 008 Applying mailbox holds in Microsoft Exchange.mp4
    05:04
  • 009 Using PowerShell to enable Litigation and Retention Holds on Microsoft Exchange.mp4
    06:21
  • 010 Implementing Microsoft Exchange Online Archiving Policies.mp4
    06:39
  • 001 Configuring Labels for Records Management.mp4
    05:03
  • 001 Records-Management-in-Microsoft-365-Microsoft-365-Compliance-Microsoft-Docs.pdf
  • 002 Managing and Migrating Retention Requirements with a File Plan.mp4
    09:06
  • 003 Configuring Automatic Retention and Sensitivity Classification Records.mp4
    05:07
  • 004 Implementing In-Place Records Management in Microsoft SharePoint.mp4
    05:16
  • 005 Managing Disposition of Records.mp4
    06:38
  • 001 Choose between eDiscovery (Standard) and eDiscovery (Premium).mp4
    06:16
  • 002 Delegate permissions and perform Content search.mp4
    07:51
  • 003 Perform searches and respond to results from eDiscovery.mp4
    08:18
  • 001 Choose between Audit (Standard) & Audit (Premium) based on an orgs requirements.mp4
    05:09
  • 002 Plan for and configure auditing.mp4
    03:35
  • 003 Investigate activities by using the unified audit log.mp4
    06:04
  • 004 Review and interpret compliance reports and dashboards using compliance manager.mp4
    05:43
  • 005 Configure alert policies.mp4
    05:18
  • 006 Configure audit retention policies.mp4
    03:46
  • 001 Communication-Compliance.pdf
  • 001 Plan for communication compliance.mp4
    08:34
  • 002 Create and manage communication compliance policies.mp4
    02:17
  • 003 Investigate and remediate communication compliance alerts and reports.mp4
    10:59
  • 001 Insider-Risk-Management.pdf
  • 001 Plan for insider risk management.mp4
    12:38
  • 002 Create and manage insider risk management policies.mp4
    11:40
  • 003 Investigate and remediate insider risk activities, alerts, and reports.mp4
    05:27
  • 004 Manage inside risk cases, forensic evidence settings, and notice templates.mp4
    06:48
  • 001 Information-Barriers.pdf
  • 001 Plan for IBs.mp4
    10:03
  • 002 Create and manage IB segments and policies.mp4
    05:40
  • 003 Configure Teams, SharePoint, & OneDrive to enforce IBs, including IB modes.mp4
    06:17
  • 004 Investigate issues with IB policies.mp4
    03:52
  • 001 Configure and maintain privacy risk management.mp4
    07:12
  • 002 Create and manage Privacy Risk Management policies.mp4
    07:04
  • 003 Subject-Rights-Request.pdf
  • 003 Understanding subject rights requests.mp4
    07:26
  • 001 BONUS Lecture.mp4
    04:02
  • Description


    Get prepared for the SC-400 exam with instructor led labs and hands on simulations available 24/7

    What You'll Learn?


    • Learn the concepts and perform hands on activities needed to pass the SC-400 exam
    • Gain a tremendous amount of knowledge involving Microsoft 365 and Azure Services
    • Get loads of hands on experience with Microsoft Information Protection Services!
    • Utilize hands on simulations that can be access anytime, anywhere!

    Who is this for?


  • IT people interested in learning and passing the Microsoft SC-400 Exam
  • People interested in learning a tremendous amount about Microsoft 365 Information Protection Services
  • What You Need to Know?


  • Willingness to put in the time and practice the steps shown in the course
  • More details


    Description

    We really hope you'll agree, this training is way more then the average course on Udemy!

    Have access to the following:

    • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

    • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

    • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

    TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

    Introduction

    • Welcome to the course

    • Understanding the Microsoft Environment

    • A Solid Foundation of Active Directory Domains

    • A Solid Foundation of RAS, DMZ, and Virtualization

    • A Solid Foundation of the Microsoft Cloud Services

    • Creating a free Microsoft 365 Azure AD Account

    • Managing Microsoft 365 Services with PowerShell

    • Connecting to Security and Compliance using PowerShell

    • IMPORTANT Using Assignments in the course

    Creating and Managing Sensitive Information Types

    • Selecting a Sensitive Information Type based on an Organization's Requirements

    • Creating and Managing Custom Sensitive Information Types

    • Creating Custom Sensitive Information Types with exact data match

    • Understanding Document Fingerprinting

    • Creating a Keyword Dictionary

    Trainable Classifiers

    • Understanding Trainable Classifiers

    • Getting Started with Trainable Classifiers

    Implementing and Managing Sensitivity Labels

    • Understanding Sensitivity Labels

    • Identifying Roles and Permissions for Administering Sensitivity Labels

    • Enabling Audit Logging before working with Sensitivity Labels

    • Creating Sensitivity Labels including with Email, Content Marking and Encryption Settings

    • Configuring and Managing Sensitivity Label Policies

    • Applying Sensitivity Labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites

    • Configuring and Publishing Automatic Labeling Policies (excluding MCAS scenarios)

    • Viewing Sensitivity Labels as an end user

    • Monitoring Data Classification and Label usage by using Label Analytics Tools such as content explorer and activity explorer

    Design and implement encryption for email messages

    • Design an email encryption solution based on methods available in Microsoft 365

    • Implement Microsoft Purview Message Encryption

    • Implement Microsoft Purview Advanced Message Encryption

    Creating and Configuring Data Loss Prevention Policies

    • Understanding the purpose of Data Loss Prevention

    • Recommending a Data Loss Prevention Solution for an Organization

    • Configuring Data Loss Prevention for Policy Precedence

    • Configuring policies for Exchange, SharePoint, OneDrive and Teams

    • Configuring the custom advanced settings in Data Loss Prevention policies

    • Editing the default Office 365 Data Loss Prevention Policy

    • Understanding Microsoft Cloud App Security (MCAS)

    • Configuring policies in Microsoft Cloud App Security (MCAS)

    • Implementing Data Loss Prevention Policies in Test Mode

    Implementing and Monitoring Microsoft Endpoint Data Loss Prevention

    • Setting up proper licensing for Microsoft Endpoint Data Loss Prevention

    • Configuring Policies for Endpoints

    • Configuring Endpoint Data Loss Prevention Settings

    • Recommending Configurations that enable devices for Endpoint Data Loss Prevention Policies

    • Monitoring Endpoint Activities and Reports for Policy Violations

    Configuring Retention Policies and Labels

    • Creating and Applying Retention Labels

    • Creating and Applying Retention Label Policies

    • Configuring and Publishing Auto-Apply Label Policies

    • Understanding Conflicting Retention Policies

    Managing Data Retention in Microsoft 365

    • Creating and Applying Retention Policies in Microsoft SharePoint and OneDrive

    • Creating and Applying Retention Policies in Microsoft Teams

    • Recovering Content in Microsoft Teams, SharePoint, and OneDrive

    • Recovering Content in Microsoft Exchange

    • Implementing Retention Policies and Tags in Microsoft Exchange Classic

    • Implementing a Retention Policy for Exchange in the Compliance Center

    • Assigning Exchange Retention Policies in Outlook

    • Applying mailbox holds in Microsoft Exchange

    • Using PowerShell to enable Litigation and Retention Holds on Microsoft Exchange Mailboxes

    • Implementing Microsoft Exchange Online Archiving Policies

    Implementing Records Management in Microsoft 365

    • Configuring Labels for Records Management

    • Managing and Migrating Retention Requirements with a File Plan

    • Configuring Automatic Retention and Sensitivity Classification Records using File Plan Descriptors

    • Implementing In-Place Records Management in Microsoft SharePoint

    • Managing Disposition of Records

    Plan and manage eDiscovery and Content search

    • Choose between eDiscovery (Standard) and eDiscovery (Premium)

    • Delegate permissions and perform Content search

    • Perform searches and respond to results from eDiscovery

    Manage and analyze audit logs and reports in Microsoft Purview

    • Choose between Audit (Standard) & Audit (Premium) based on an orgs requirements

    • Plan for and configure auditing

    • Investigate activities by using the unified audit log

    • Review and interpret compliance reports and dashboards using compliance manager

    • Configure alert policies

    • Configure audit retention policies

    Implement and manage Microsoft Purview Communication Compliance

    • Plan for communication compliance

    • Create and manage communication compliance policies

    • Investigate and remediate communication compliance alerts and reports

    Implement and manage Microsoft Purview Insider Risk Management

    • Plan for insider risk management

    • Create and manage insider risk management policies

    • Investigate and remediate insider risk activities, alerts, and reports

    • Manage inside risk cases, forensic evidence settings, and notice templates

    Implement and manage Microsoft Purview Information Barriers (IBs)

    • Plan for IBs

    • Create and manage IB segments and policies

    • Configure Teams, SharePoint, & OneDrive to enforce IBs, including IB modes

    • Investigate issues with IB policies

    Implement and manage privacy requirements by using Microsoft Priva

    • Configure and maintain privacy risk management

    • Create and manage Privacy Risk Management policies

    • Understanding subject rights requests

    Who this course is for:

    • IT people interested in learning and passing the Microsoft SC-400 Exam
    • People interested in learning a tremendous amount about Microsoft 365 Information Protection Services

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    John Christopher
    John Christopher
    Instructor's Courses
    John Christopher is a Technical Instructor that has been in the business for over 20 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance in Atlanta GA. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company, located in Atlanta GA. in 2001.For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 91
    • duration 9:38:12
    • English subtitles has
    • Release Date 2023/12/09

    Courses related to Information Security